Advanced search
1 file | 150.23 KB Add to list

Emotional experiences of cybersecurity breach victims

Author
Organization
Project
Abstract
This study investigated emotional reactions to cybersecurity breaches. Based on prior research, a context-specific instrument was developed. This new instrument covered all five emotion components identified by the componential emotion approach. In total, 145 participants that experienced a cybersecurity breach reported on their appraisals, action tendencies, bodily reactions, expressions, subjective feelings, and regulation attempts. A principal component analysis on a total of 75 emotion reactions revealed a clear three-dimensional structure. The first dimension represented the extent to which the person was generally emotionally affected. The second dimension revealed constructive action tendencies and subjective feelings that were opposed to unconstructive action tendencies, expressions, and bodily reactions. The third dimension revealed cognitive motivational reactions that were opposed to affective reactions. This study clearly indicated that cybersecurity breaches do not only form a challenge for engineers, but also have important psychological ramifications that need to be addressed. Although some people have a tendency to react with constructive and proactive actions that are likely to limit the negative consequences of the cybersecurity breach, others experience a strong negative affective stress reaction and are unlikely to take the appropriate steps to deal with the security breach situation. These people, especially, can be expected to be vulnerable to psychological complaints and possibly psychopathology. The newly developed instrument uses a comprehensive approach to assess emotional reactions to cybersecurity threats and provides an efficient way to identify potentially problematic reactions.
Keywords
Computer Science Applications, Human-Computer Interaction, Applied Psychology, Communication, General Medicine, Social Psychology, cybersecurity breach victims, emotion processes, componential emotion approach

Downloads

  • Budimir Fontaine Roesch 2021 Emotional Experiences of Cybersecurity Breach Victims.pdf
    • full text (Published version)
    • |
    • open access
    • |
    • PDF
    • |
    • 150.23 KB

Citation

Please use this url to cite or link to this publication:

MLA
Budimir, Sanja, et al. “Emotional Experiences of Cybersecurity Breach Victims.” CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, vol. 24, no. 9, 2021, pp. 612–16, doi:10.1089/cyber.2020.0525.
APA
Budimir, S., Fontaine, J., & Roesch, E. B. (2021). Emotional experiences of cybersecurity breach victims. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, 24(9), 612–616. https://doi.org/10.1089/cyber.2020.0525
Chicago author-date
Budimir, Sanja, Johnny Fontaine, and Etienne B. Roesch. 2021. “Emotional Experiences of Cybersecurity Breach Victims.” CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 24 (9): 612–16. https://doi.org/10.1089/cyber.2020.0525.
Chicago author-date (all authors)
Budimir, Sanja, Johnny Fontaine, and Etienne B. Roesch. 2021. “Emotional Experiences of Cybersecurity Breach Victims.” CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 24 (9): 612–616. doi:10.1089/cyber.2020.0525.
Vancouver
1.
Budimir S, Fontaine J, Roesch EB. Emotional experiences of cybersecurity breach victims. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING. 2021;24(9):612–6.
IEEE
[1]
S. Budimir, J. Fontaine, and E. B. Roesch, “Emotional experiences of cybersecurity breach victims,” CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, vol. 24, no. 9, pp. 612–616, 2021.
@article{8741187,
  abstract     = {{This study investigated emotional reactions to cybersecurity breaches. Based on prior research, a context-specific instrument was developed. This new instrument covered all five emotion components identified by the componential emotion approach. In total, 145 participants that experienced a cybersecurity breach reported on their appraisals, action tendencies, bodily reactions, expressions, subjective feelings, and regulation attempts. A principal component analysis on a total of 75 emotion reactions revealed a clear three-dimensional structure. The first dimension represented the extent to which the person was generally emotionally affected. The second dimension revealed constructive action tendencies and subjective feelings that were opposed to unconstructive action tendencies, expressions, and bodily reactions. The third dimension revealed cognitive motivational reactions that were opposed to affective reactions. This study clearly indicated that cybersecurity breaches do not only form a challenge for engineers, but also have important psychological ramifications that need to be addressed. Although some people have a tendency to react with constructive and proactive actions that are likely to limit the negative consequences of the cybersecurity breach, others experience a strong negative affective stress reaction and are unlikely to take the appropriate steps to deal with the security breach situation. These people, especially, can be expected to be vulnerable to psychological complaints and possibly psychopathology. The newly developed instrument uses a comprehensive approach to assess emotional reactions to cybersecurity threats and provides an efficient way to identify potentially problematic reactions.}},
  author       = {{Budimir, Sanja and Fontaine, Johnny and Roesch, Etienne B.}},
  issn         = {{2152-2715}},
  journal      = {{CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING}},
  keywords     = {{Computer Science Applications,Human-Computer Interaction,Applied Psychology,Communication,General Medicine,Social Psychology,cybersecurity breach victims,emotion processes,componential emotion approach}},
  language     = {{eng}},
  number       = {{9}},
  pages        = {{612--616}},
  title        = {{Emotional experiences of cybersecurity breach victims}},
  url          = {{http://dx.doi.org/10.1089/cyber.2020.0525}},
  volume       = {{24}},
  year         = {{2021}},
}

Altmetric
View in Altmetric
Web of Science
Times cited: